Abstract
Mobile Ad-hoc Networks (MANETs) are frequently exposed to a wide range of cyber threats due to their unique characteristics. The lack of a centralized monitoring and management infrastructure and the dynamic nature of their topology pose new and interesting challenges for the design of effective security mechanisms. While conventional methods primarily focus on detecting attacks, in this work we focus on estimating the attackers’ physical location in the network, and propose a probabilistic framework for aggregating information gathered from nodes reporting malicious activity in their vicinity. In order to overcome the limitations of the decentralized nature of MANETs, we present a distributed approach to attacker localization based on dynamically partitioning the network into clusters. These self-organizing clusters can (i) independently find the approximate location of the attackers in real time, and (ii) deploy trusted resources to capture attackers. We show, through experiments in a simulated environment, that our approach is effective and efficient.
Keywords
The work presented in this paper is supported in part by the Office of Naval Research under award number N00014-12-1-0461.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Albanese, M., De Benedictis, A., Jajodia, S., Shakarian, P.: A probabilistic framework for localization of attackers in mANETs. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 145–162. Springer, Heidelberg (2012)
Baker, D.J., Ephremides, A.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Transactions on Communications 29(11), 1694–1701 (1981)
Baker, D.J., Ephremides, A.: A distributed algorithm for organizing mobile radio telecommunication networks. In: Proceedings of the 2nd International Conference on Distributed Computer Systems, Paris, France, pp. 476–483 (1981)
Basu, P., Khan, N., Little, T.D.C.: A mobility based metric for clustering in mobile ad hoc networks. In: Proceedings of the 21st International Conference on Distributed Computing Systems Workshops, Mesa, AZ, USA, pp. 413–418 (April 2001)
Chatterjee, M., Das, S.K., Turgut, D.: WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing 5(2), 193–204 (2002)
Liu, H., Liu, Z., Chen, Y., Xu, W.: Localizing multiple jamming attackers in wireless networks. In: Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, pp. 517–528 (June 2011)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, MA, USA, pp. 255–265 (August 2000)
Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Transactions on Parallel and Distributed Systems 24(1), 44–58 (2013)
Zeng, Y., Cao, J., Hong, J., Xie, L.: Secure localization and location verification in wireless sensor networks. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS 2009), Macao, China, pp. 864–869 (October 2009)
Zhan, S., Li, J.: Active cross-layer location identification of attackers in wireless sensor networks. In: Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET 2010), Chengdu, China, vol. 3, pp. 240–244 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
De Benedictis, A., Koosha, B., Albanese, M., Casola, V. (2013). A Probabilistic Framework for Distributed Localization of Attackers in MANETs. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-41098-7_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41097-0
Online ISBN: 978-3-642-41098-7
eBook Packages: Computer ScienceComputer Science (R0)